Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 16:57
Static task
static1
Behavioral task
behavioral1
Sample
c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe
Resource
win10v2004-20241007-en
General
-
Target
c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe
-
Size
814KB
-
MD5
7af181fe04d4b6088537bc03a9b30b24
-
SHA1
ffd63d6eed2921261a3a29b49040634385fb0baa
-
SHA256
c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada
-
SHA512
75b7928f57310a3aee8bf7444e210552d6ade6f749cfdcb8483f3ca7cea572120125567a1f8409aa5fc8f554875137214edb7c266453ad930bcaa72940f74a04
-
SSDEEP
12288:vMrIy90peI8snoq5Jd3PMwlIywgIb2X1HSFE9kb75Qczi4SIHwxy3DQFzGxlNdSR:Tydsn75rBeFiFHS1jMqD48BeVl
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1736-19-0x00000000026B0000-0x00000000026CA000-memory.dmp healer behavioral1/memory/1736-21-0x0000000002750000-0x0000000002768000-memory.dmp healer behavioral1/memory/1736-49-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-47-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-45-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-43-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-41-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-39-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-37-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-35-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-33-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-31-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-30-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-27-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-25-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-23-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/1736-22-0x0000000002750000-0x0000000002762000-memory.dmp healer -
Healer family
-
Processes:
pro2196.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2196.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2196.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3136-2143-0x0000000002A50000-0x0000000002A82000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5652-2156-0x0000000000730000-0x0000000000760000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178276.exe family_redline behavioral1/memory/2548-2167-0x0000000000210000-0x000000000023E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7782.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation qu7782.exe -
Executes dropped EXE 5 IoCs
Processes:
un177467.exepro2196.exequ7782.exe1.exesi178276.exepid process 3936 un177467.exe 1736 pro2196.exe 3136 qu7782.exe 5652 1.exe 2548 si178276.exe -
Processes:
pro2196.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2196.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exeun177467.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un177467.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1616 1736 WerFault.exe pro2196.exe 2256 3136 WerFault.exe qu7782.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exeun177467.exepro2196.exequ7782.exe1.exesi178276.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un177467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2196.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7782.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si178276.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2196.exepid process 1736 pro2196.exe 1736 pro2196.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2196.exequ7782.exedescription pid process Token: SeDebugPrivilege 1736 pro2196.exe Token: SeDebugPrivilege 3136 qu7782.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exeun177467.exequ7782.exedescription pid process target process PID 2132 wrote to memory of 3936 2132 c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe un177467.exe PID 2132 wrote to memory of 3936 2132 c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe un177467.exe PID 2132 wrote to memory of 3936 2132 c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe un177467.exe PID 3936 wrote to memory of 1736 3936 un177467.exe pro2196.exe PID 3936 wrote to memory of 1736 3936 un177467.exe pro2196.exe PID 3936 wrote to memory of 1736 3936 un177467.exe pro2196.exe PID 3936 wrote to memory of 3136 3936 un177467.exe qu7782.exe PID 3936 wrote to memory of 3136 3936 un177467.exe qu7782.exe PID 3936 wrote to memory of 3136 3936 un177467.exe qu7782.exe PID 3136 wrote to memory of 5652 3136 qu7782.exe 1.exe PID 3136 wrote to memory of 5652 3136 qu7782.exe 1.exe PID 3136 wrote to memory of 5652 3136 qu7782.exe 1.exe PID 2132 wrote to memory of 2548 2132 c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe si178276.exe PID 2132 wrote to memory of 2548 2132 c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe si178276.exe PID 2132 wrote to memory of 2548 2132 c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe si178276.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe"C:\Users\Admin\AppData\Local\Temp\c8750979f0da3481399138a0bf5939e859759941a5881b5c5f0ae15c73cb4ada.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un177467.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un177467.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2196.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2196.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 10844⤵
- Program crash
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7782.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7782.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 13844⤵
- Program crash
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178276.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178276.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1736 -ip 17361⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3136 -ip 31361⤵PID:4796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5e726eb7327b3e3c0f14ee933b4dd39d6
SHA1abe50c2a0710319a395334aa241a0c6ad12a629a
SHA25625e048c92dfa170040eefd649693b7368752c34747f04da0b510ead57fcb9fe6
SHA51255d8e05ebfe637e6ea318587d916bf6a09dfc7a5eb2ca7e4979a2f0091cbcc5cb2f234ae1aee12a0f05c9b094b6ad240d89843657349fbe0855fc990dff0f70b
-
Filesize
661KB
MD5085daa32369c1b980ab9f3372aa7b41d
SHA1c13edb7949226d256fbcc8ffb97371f758cedcb9
SHA256141a6857593b81fde25802dd29338f1b557265f20c0a6cc87e4ca9020518ca42
SHA5128c91ab8d1a953130362d18e4d8639e309c59777f4c8b759d890901599b1f7b220b7d2f4c462811d0f02ddb1a7725a130bcf29970a09b9eece5e4e43874ad9f87
-
Filesize
312KB
MD561c36046e4a1099b2001a16d5a65c639
SHA17f9023e6099f500afc0f585f31b7272660d0c68a
SHA2566e76829df29f79eaac4bf68b325bbeebc0728134e14479e9f27877463dfb6152
SHA51232f89f549093a9f8ba977a55aa985c08016b6bc2f3e8d66afd537c5e2e2bc2172b5d33b4cbe9c97a17441f7ea77d0807085b8737922d36cdd479b06cf43d3bb9
-
Filesize
495KB
MD5162e0ebd4140228b10f0290c5cac5f51
SHA155d87f633732ec9a8fa591ea59ba05cf08529bcd
SHA2560c89054a5d81ff53cdd02728aacd3e3cce30a25faa760f06e2f55e4c6c4077a4
SHA512b18b3cca5ce2f7aa4b04b2458a258dc67fd29289896b84e83c54d7ce91ec8b526675012c03ab4b945548a72acfdaa402c2ca677caca0d5a680668e4def1c9181
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0